Based on security requirements audit, we perform gradual implementations from smaller pieces into a robust security solutions.
We provide Security Operations Center/SIEM as a 24-hour, 7-day-a-week service throughout the year. We detect, analyse and deal with security incidents of our clients.
We provide detection, analysis and investigation, response and other activities upon sets of security events, offenses and incidents.
We provide comprehensive management of security events and incidents within the organisation. We highlight possible threats, identified incidents and security incidents.
We're conducting security testing. Penetration and vulnerability testing verifies the organisation's resilience to cyber attacks and identifies existing security vulnerabilities.
The NESTOR SOC security surveillance center builds on 20 years of our experience in technology and application monitoring. With this service, we have decided to offer security monitoring to organisations that do not hire their own experts or choose not to build their own security team.
Manages the team. Is responsible for the operation of SOC, reporting, supervision, process compliance. Provides organisational and technical advice, develops and implements contingency communication plans and other framework activities.
Responsible for handling incidents. Oversees the flow of cyber incident management process, isolation, analysis and resolution. Is in charge of prioritising actions and decides how, when and where to apply reactive measures.
L1 level analyst is an operator of security monitoring tools. Identifies cyber security events, offenses and incidents.
L2 level analyst. Isolates identified cybersecurity incidents, investigates and sets reactive measures.
L3 level analyst, an expert in dealing with very serious incidents and threats. Sets precautions to prevent the cyber security threats and incidents.
Events per second
Networks Flows per minute
Event and Log
Our CSIRT team is primarily focused on helping to deal with security incidents at commercial, public, non-profit and government institutions. We address the incidents threatening companies‘ infrastructure and information values. We help to prevent cyber incidents as much as possible. We coooperate with other CSIRT teams within The Czech Republic and and abroad to achieve these goals effectively.
The scope of our activities covers the core systems and other technology environments of our clients and partners.
We are an accredited member of Trusted Introducer. The Trusted Introducer (TI) association brings together security teams from the fields of government, national, commercial organizations including banks, internet operators, hardware manufacturers, universities, etc.
To report incidents:
Use the following PGP key for encrypted communication:
User-ID: pub 4096R/ED27BEEA 20.02.2023
Key-ID: 9A33 FCE1 ED27 BEEA
Fingerprint: D010 VA0C F8D5 EB99 E83B DA9F 9A33 FCE1 ED27 BEEA
TOTAL SERVICE a.s.
U Uranie 954/18
170 00 Praha 7
VAT registration number: CZ25618067
© 2002–2021 All rights reserved.